A SolarWinds shareholder has filed a lawsuit claiming the company included misleading statements - regarding the security of its products - in its filings with the U.S. Securities and Exchange Commission.
What compliance lessons can be learned from major fraud cases in 2020, including the Goldman Sachs bribery case, the Wirecard mass corruption case and the Novartis bribery case? A panel of experts offers in-depth analysis.
Akamai has recently observed and mitigated an unprecedented number of extortion-driven DDoS attacks across numerous verticals, including manufacturing, gaming, and financial services. Is your organization prepared to respond if you’re a target of a DDoS extortion group? In our new security checklist, learn the key...
Lawmakers who participated in the bipartisan Cyberspace Solarium Commission applauded Congress' override of President Donald Trump's veto of the National Defense Authorization Act, pointing to its 77 cybersecurity provisions, including restoration of the position of national cyber director at the White House.
A British judge has denied a Justice Department request to extradite WikiLeaks founder Julian Assange to the U.S. to face criminal charges related to hacking government computers and then publishing classified information. U.S. prosecutors plan to appeal.
New regulatory provisions that allow healthcare systems to make donations of cybersecurity technology and services to physician practices could help greatly bolster security in the sector, says attorney Julie Kass of law firm Baker Donelson.
In less than a month, President-elect Joe Biden will be sworn into office and immediately confront a list of cybersecurity problems ranging from a now-leaderless CISA to the SolarWinds breach. Here's how security experts - and former government leaders - see the administration's cyber policies taking shape.
The growth in the use of telehealth during the COVID-19 crisis means that healthcare providers must carefully reassess and bolster the security of the connected devices, applications and systems used, says Kelly Rozumalski of the consultancy Booz Allen Hamilton.
In the year ahead, healthcare organizations must be prepared to face an assortment of advancing security threats, including those that damage the integrity of critical patient data, says Rod Piechowski of the Healthcare Information and Management Systems Society.
More than two years after Europe's tough new General Data Protection Regulation came into full effect, EU privacy watchdogs are finding more consensus, and consumers have been benefiting, experts say. But how regulators apply sanctions, in particular, remains a work in progress.
The COVID-19 pandemic has spotlighted an array of evolving patient privacy issues that legislators and regulators will need to address in the year ahead, say government policy experts Mari Savickis and Cassie Leonard of the College of Healthcare Information Management Executives.
In the wake of the SolarWinds breach, NIST's Ron Ross has turned his attention to systems security engineering - and the reality that the adversaries are exploiting it to their advantage better than the defenders are. This disparity, Ross says, has to change.
Assets worth $4 million have been seized by authorities in Singapore from the former CEO of Phantom Secure, a now-defunct encrypted telecommunications services provider that offered services to transnational organized criminal syndicates, according to the U.S. Justice Department.
For the first time, a U.S. technology firm has been fined under the EU's General Data Protection Regulation. Ireland's Data Protection Commission on Tuesday hit social media giant Twitter with a $547,000 fine for failing to report and document a data breach within 72 hours, as required under GDPR.
To improve compliance efforts, organizations can turn to a number of technologies, including data analytics. Two experts share their views on making the most of automation and integration tools.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.co.uk, you agree to our use of cookies.